Sei sulla pagina 1di 4

International Journal of Information Technology (IJIT) – Volume 4 Issue 6, Nov-Dec 2018

RESEARCH ARTICLE OPEN ACCESS

Ethical Hacking
Azhar Ushmani
Cyber Security
Western Governor University
Salt Lake City, Utah
USA

ABSTRACT
Hacking is common process which results in the breaching of one’s privacy and confidential information. The
weaknesses of a system or loopholes in a network are identified and private details are accessed. Therefore,
hacking is also known as unauthorized intrusion ("What Is Hacking? | Ethical Hacking"). However, hacking was
not always perceived as theft and used for productive causes. Such type of hacking that involves good intentions
is known as ethical hacking.
Keywords:- Ethical Hacking, Hackers

I. DEFINING ETHICAL HACKING privacy (Babbar, Jain and Kang). With the
advancement of technical systems and rapidly
The term hacking is divided into two types progressing technology-oriented future, there is a
depending on the intention behind hacking process. dire need of ethical hacking.
The two types are white-hat hacking and black-hat
hacking. According to CDN, white-hat hacking II. ETHICAL HACKERS AND THEIR
refers to ethical hacking which is performed with PURPOSE
the target’s agreement to discover system’s
vulnerability from a hacker’s perspective. Such The people who specialize in ethical hacking
type of hacking is done to secure the system from process are known as ethical hackers. They are the
black-hat hackers who have malicious intentions of professionals who hack into a system or network to
stealing and exploiting personal information. The locate possible faults, pitfalls, and vulnerabilities
tools and tricks used to hack the system are the that may be exploited by black-hat hackers or
same for both types of hacking processes crackers (Babbar, Jain and Kang). The skills and
(“Cdn.ttgtmedia.com”). Therefore, the white-hat mindset of ethical hackers are equal to hackers with
and black-hat hackers think alike. The difference malicious intentions but they can be trusted. Ethical
between these two categories is the idea or purpose hackers are certified and authorized for performing
behind hacking any system. If this purpose is to hacking on target systems ("Certified Ethical
serve greater good like reducing security issues and Hacker - CEH Certification | EC-Council"). An
stabilize organizational systems, the hacker is ethical hacker has legal permission to access
known as an ethical hacker. On the other hand, target’s personal details and modify target system.
hackers with malicious intentions of stealing The talents possessed by an ethical hacker can be
personal details and hurting privacy are not used to limit cyber crime.
considered as ethical hackers. Along with the white-hat and black-hat
Ethical hacking is legal since it is hackers, another category of hackers was also
performed after acquiring the target’s consent. discovered who work in close affiliation with
According to CDN, the process of ethical hacking ethical hackers yet face some social consequences.
confirms the claim of multiple vendors about the These hackers are known as gray-hat hackers who
security of their products. The significance of hack technical and network systems for good
ethical hacking is boundless since it comes in causes like helping organizations to fix security
handy for protecting crucial systems, networks, and issues, but are unauthorized (Radziwill et al.).
accounts from data thieves by thinking exactly like Gray-hat hackers implement ethical hacking but
them. It provides full control to the information their unauthorized approach leads to lack of social
owner, detects system flaws, strengthens computer acceptance. Ethical hackers are hired by agencies,
security, prevents system attacks, and respects

ISSN: 2454-5414 www.ijitjournal.org Page 1


International Journal of Information Technology (IJIT) – Volume 4 Issue 6, Nov-Dec 2018

companies, and organizations to keep their security Of Hacking | Ethical Hacking"). Otherwise, if the
in check. hacker has made necessary changes in the system,
the access does not need to be maintained. The last
III. HACKING PHASE phase of hacking involves track clearing to erase all
traces and evidence that the system was hacked. All
the folders created, applications installed, and the
Hacking is not a single-phase process. Five phases
registry values that were modified are deleted in
are carried out in order to complete the process of
this step ("Phases Of Hacking | Ethical Hacking").
hacking ("Phases Of Hacking | Ethical Hacking");
The changes are made unrecognizable so that the
 Reconnaissance
hacking process is not detectable.
 Scanning
 Gaining Access
IV. PROCESS, TOOLS, AND
 Maintaining Access
 Clearing Tracks TECHNOLOGY
It is not necessary for a hacker to follow
these phases in a sequential order. However, Since every process requires a few dedicated tools
implementation of these phases in the same order and techniques to accomplish the task, the process
can result in accurate hacking. In the first phase, of hacking also requires the right tools. According
maximum information about network, hosts, and to CDN, it is important to realize personal and
people involved is collected to perform footprinting technical limitations when it comes to utilization of
or reconnaissance ("Phases Of Hacking | Ethical ethical hacking tools. Since every equipment
Hacking"). This can be done either by directly contains minor inaccuracies, it is not necessary that
approaching the target and gaining knowledge or using the right tools will detect every possible
by using indirect methods such as websites, social vulnerability in the system. However, if more tools
sites, etc without approaching the target directly are used in hacking process, the chance of more
("Phases Of Hacking | Ethical Hacking"). Data inaccuracy in the results is decreased. The main
collection provides a deep insight to the system skills and processes that a hacker should be aware
under observation. of contain HTTP, HTTPS, and other network
The second phase involves thorough protocols, authentication methods, network and
scanning of the target. Three processes are involved firewall architectures, port details, web
in scanning phase; port scanning, vulnerability applications, web servers configurations, database
scanning, and network mapping ("Phases Of setups, and programming languages like HTML,
Hacking | Ethical Hacking"). Technical tools are Ruby, Python, JavaScript (Babbar, Jain and Kang).
implemented to further process the target, for These skills and knowledge set allow a hacker to
instance, vulnerability scanner is installed on the understand most of the targeted networks and
target network to determine safety threats systems without any complications. These are the
("Summarizing The Five Phases Of Penetration basic abilities acquired by hacker to understand
Testing - Cybrary"). In the third phase, the hacker their targets and have a complete sense of
finally gains access to the target system or network professionalism while implementing hacking
by using various techniques and tools. When the process.
system is accessed, the hacker is required to reach The knowledge of systems and networks is not
administrator level to modify or install the data enough to accomplish hacking process. Specific
according to the requirement ("Phases Of Hacking | tools and software applications are dedicated to
Ethical Hacking"). Modification in network or carry out ethical hacking with accuracy (Babbar,
system data takes place after installing a dedicated Jain and Kang). They simplify hacking process and
application that allows the hacker to change are convenient to use for the hackers who are at a
network settings. beginning stage. Some of these tools are
The process of maintaining access is quite Vulnerability Scanners, Packet Sniffers, Password
important as once target access is lost, the process Crackers, Hacking Hardware, Application and Port
of gaining it will be repeated all over again. Certain Scanners. CDN enlists other commercial and open-
access maintaining files are used for this purpose if source ethical hacking tools such as Nmap, Ether
the task of a hacker is not yet completed ("Phases Peek

ISSN: 2454-5414 www.ijitjournal.org Page 2


International Journal of Information Technology (IJIT) – Volume 4 Issue 6, Nov-Dec 2018

WebInspect, Ethereal, Kismet, Nikto, aware of the advantages (Marsh). There is a need of
QualysGuard, SuperScan, ToneLoc, LC4, awareness to allow the business to be more open
LANguard Scanner for Network Security, Internet towards ethical hacking and secure their products.
Scanner, Nessus, etc. These tools and equipment Ethical hackers are competent against cyber thieves
are available commercially for professional ethical and black-hat hackers and by acquiring their
hackers and come along with a guide for further services it will be easier to fight against them.
convenience. These professionals are the only ones who can
think and act like malicious hackers so it is
V. IMPACT ON BUSINESS important to promote their significance in this
society.
Ethical Hacking provides an easy method to locate
insecurities of any system and vulnerabilities of a VI. CONCLUSION
network. There are good and productive intentions
behind ethical hacking that can protect any Hackers detect flaws and vulnerabilities in a system
business, product, or a person from those who or network and modify it according to their
intend to do any harm. Throughout these years requirements. There are two categories of hackers
many businesses have suffered loss due to the theft known as the white-hat and the black-hat who are
of their valuable information. Others have lost the only differentiated by their intentions towards
trust of their customers due to poor safety hacking. Ethical hackers of white-hat hackers are
measures. To avoid these consequences, businesses not accepted well by the society and are perceived
and organizations have started hiring ethical hacker as general hackers who have malicious intentions.
to keep a check on their network security and There is a need of creating awareness about ethical
reduce possible vulnerabilities (Munjal 922-931). hackers to avoid security breaching of products.
Computer security companies, mobile companies, Ethical hackers are trustworthy and have positive
and even network providers have invested in and productive motives. They are certified
ethical hacking professionals to detect flaws in professionals who are appointed by organizations
their system and update it to maximize system to keep their security in check which is why they
security. are important for the society and businesses. Every
Information technology is progressing hacker utilizes certain tools, skills, and gadgets to
rapidly in today’s world and all the present data is carry out the hacking process. Therefore, the
in the form of computer program, bytes, and mindset and thinking capabilities of every hacker is
electronic digits. This data demands safety in order the same. Five phases of hacking are required to
to increase the longevity and usage of electronic complete target hacking successfully. If today’s
systems. A number of sites and electronic markets society and businesses started taking the services of
are encouraging customers to turn to internet trustworthy hackers, security threats will be greatly
instead of offline shopping. So many people reduced.
provide their personal information such as
addresses and bank account details that can be REFERENCE
threatened if the services of ethical hackers are not
utilized (Munjal 922-931). The trustworthy nature
[1] Cdn.ttgtmedia.com. Web. 14 Dec. 2018.
of ethical hackers can provide a safe electronic
[2] Babbar, Sahil, Rachit Jain, and Jinkeon
environment for customers and general public. If a
Kang. "Ethical Hacking." Research Gate.
business is able to obtain the trust of their audience,
N.p., 2015. Web. 14 Dec. 2018.
it can prove to be quite fruitful for their business.
[3] "Certified Ethical Hacker - CEH
Ethical hackers play a vital role in
Certification | EC-Council." EC-Council.
diminishing cyber-crime from the society and
N.p., 2018. Web. 14 Dec. 2018.
promoting a criminal-free environment. However,
[4] Marsh, Devin. "Are Ethical Hackers The
it is possible that the advantages of ethical hackers
Best Solution For Combating The
are still unknown to people. Some companies were
Growing World Of Cyber-Crime?."
interviewed proving that not every company
Jewlscholar.mtsu.edu. N.p., 2017. Web.
utilizes the services of ethical hackers and are
15 Dec. 2018.

ISSN: 2454-5414 www.ijitjournal.org Page 3


International Journal of Information Technology (IJIT) – Volume 4 Issue 6, Nov-Dec 2018

[5] Munjal, Meenaakshi N. "ETHICAL [8] "Summarizing The Five Phases Of


HACKING: AN IMPACT ON Penetration Testing - Cybrary." Cybrary.
SOCIETY." 7.1 (2013): 922-931. Web. 14 N.p., 2015. Web. 14 Dec. 2018.
Dec. 2018. [9] "What Is Hacking? | Ethical Hacking."
[6] "Phases Of Hacking | Ethical Hacking." Greycampus.com. N.p., 2018. Web. 14
Greycampus.com. Web. 14 Dec. 2018. Dec. 2018.
[7] Radziwill, Nicole et al. "The Ethics Of
Hacking: Should It Be Taught?."
Arxiv.org. N.p., 2005. Web. 14 Dec. 2018.

ISSN: 2454-5414 www.ijitjournal.org Page 4

Potrebbero piacerti anche